General
-
Target
63987b3405748d059a28a07f7a5e24f7fad1c6bbfcfce507b7c0aea651f02219
-
Size
7.0MB
-
Sample
241021-tp2smayelc
-
MD5
80fc186d5e0d36d61aa30e7806847b37
-
SHA1
dbfb171d5774306ff5437bdf11405c2d09771b76
-
SHA256
63987b3405748d059a28a07f7a5e24f7fad1c6bbfcfce507b7c0aea651f02219
-
SHA512
6e9f7077de1da76e05dff833bd6d8f7558441df91db9bddbe339afad4271a76745618337631ef76b22ba47e81f55c8bfb7e1a941a5aa314043286edbef83e622
-
SSDEEP
196608:2KXbeO7G9Ghf7Ejo+xyvsLD26vhn2IGJ3:b7GEhio0yI265GJ3
Static task
static1
Behavioral task
behavioral1
Sample
63987b3405748d059a28a07f7a5e24f7fad1c6bbfcfce507b7c0aea651f02219.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
63987b3405748d059a28a07f7a5e24f7fad1c6bbfcfce507b7c0aea651f02219
-
Size
7.0MB
-
MD5
80fc186d5e0d36d61aa30e7806847b37
-
SHA1
dbfb171d5774306ff5437bdf11405c2d09771b76
-
SHA256
63987b3405748d059a28a07f7a5e24f7fad1c6bbfcfce507b7c0aea651f02219
-
SHA512
6e9f7077de1da76e05dff833bd6d8f7558441df91db9bddbe339afad4271a76745618337631ef76b22ba47e81f55c8bfb7e1a941a5aa314043286edbef83e622
-
SSDEEP
196608:2KXbeO7G9Ghf7Ejo+xyvsLD26vhn2IGJ3:b7GEhio0yI265GJ3
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2